Search Results - (( intelligence _ protocol algorithm ) OR ( intelligence valid based algorithm ))

Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  2. 2

    The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Ahmad A., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
    Conference Paper
  3. 3

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…The validity of the proposed algorithm is investigated by its comparison with ARP-QD protocol, which works on the mechanism of optimal route finding in VANETs in urban environments. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy by Mukil , Alagirisamy

    Published 2020
    “…Residual energy of POR is 0.26 times higher and PRMTI is 0.14 times higher than the existing protocol. The simulation results of clustering algorithms, INACS and Perceptron framework are validated using various data analysis methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients by Rahman, Md Saidur, Md Nor, Nor Saadah

    Published 2024
    “…It requires early detection for management. Artificial Intelligence (AI) has emerged as a transformative tool in the management of CKD, enabling more precise diagnosis, treatment optimization, and long-term care. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…This thesis focussed on the development of PV module integrated with positive output (PO) buck-boost converter by intelligent control of MPPT technique. A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…Finally, CEC-GP shows a better stability performance compared with "Centre-based Stable Clustering (CBSC)" and "Evolving Data Clustering Algorithm (EDCA)" based on different performance metrics such as the clustering efficiency, the cluster head, and cluster member duration, the cluster head change rate, and the number of created clusters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…This architecture is based on the combination of three well-known techniques, namely, artificial neural networks, fuzzy logic and genetic algorithm. …”
    thesis::doctoral thesis
  14. 14
  15. 15

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Hybrid Intelligent Warning System for Boiler tube Leak Trips by Singh, D., Ismail, F.B., Shakir Nasif, M.

    Published 2017
    “…The first intelligent warning system (IWS-1) represents the use of pure artificial neural network system whereas the second intelligent warning system (IWS-2) represents merging of genetic algorithms and artificial neural networks as a hybrid intelligent system. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper
  20. 20

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The aim of the research is to introduce novel form of swarm intelligence algorithms based on real echolocation behaviour of bats. …”
    Get full text
    Get full text
    Thesis